Quantum-resilient and adaptive multi-region data aggregation for IoMT using zero-knowledge proofs and edge intelligence [PDF]
The Internet of Medical Things (IoMT) transforms healthcare by enabling real-time monitoring of patient vitals, such as heart rate and glucose levels, but faces significant challenges in securing sensitive data against cyber threats and ensuring ...
Soufiane Ben Othman, Gyanendra Kumar
doaj +2 more sources
A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update [PDF]
Although the copyright protection schemes supported by blockchain have significantly changed traditional copyright data management, there are still some data security challenges that cannot be ignored, especially the secure access and controllable ...
Jian Jiang +3 more
doaj +2 more sources
Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]
The following investigation examined endoscopic surgical interval rates across a patient with idiopathic subglottic stenosis (iSGS) first 2 years of treatment compared to their last 3 years of treatment over a total of 5 years of follow up. Through comparison of these two intervals a disease severity classification for iSGS based on decreasing ...
Bowen AJ +15 more
europepmc +2 more sources
Nonlinear optical properties of photosensory core modules of monomeric and dimeric bacterial phytochromes. [PDF]
Abstract Near‐infrared (NIR) fluorescent proteins and optogenetic tools derived from bacterial phytochromes' photosensory core modules (PCMs) operate within the first (NIR‐I) tissue transparency window under single‐photon activation. Leveraging two‐photon (2P) light in the second transparency window (NIR‐II) for photoswitching bacterial phytochromes ...
Galiakhmetova D +11 more
europepmc +2 more sources
In this paper, we propose a masking scheme to protect ring-LWE decryption from first-order side-channel attacks. In an unprotected ring-LWE decryption, the recovered plaintext is computed by first performing polynomial arithmetic on the secret key and then decoding the result. We mask the polynomial operations by arithmetically splitting the secret key
De Clercq, Ruan +4 more
openaire +2 more sources
Reduction From Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS
Lattice-based cryptographic scheme is constructed based on hard problems on a lattice such as the short integer solution (SIS) problem and the learning with error (LWE).
Zahyun Koo, Jong-Seon No, Young-Sik Kim
doaj +1 more source
Towards an efficient LWE‐based fully homomorphic encryption scheme
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah +1 more
doaj +1 more source
A Masked Ring-LWE Implementation [PDF]
Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper, we present a masked ring-LWE decryption implementation resistant to first-order side-channel attacks. Our solution has the peculiarity that the entire computation is performed in the masked domain.
Reparaz, Oscar +3 more
openaire +2 more sources
Implementing Conjunction Obfuscation Under Entropic Ring LWE [PDF]
We address the practicality challenges of secure program obfuscation by implementing, optimizing, and experimentally assessing an approach to securely obfuscate conjunction programs proposed in [1]. Conjunction programs evaluate functions f (x_1,...,x_L) = wedge_i in _I y_i, where y_i is either x_i or -x_i and I subseteq [L], and can be used as ...
Cousins, David Bruce +7 more
openaire +1 more source
A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme
In this article, we give a digital signature by using Lindner–Peikert cryptosystem. The security of this digital signature is based on the assumptions about hardness of Ring-LWE and Ring-SIS problems, along with providing public key and signature of ...
Sharafi Javad, Daghigh Hassan
doaj +1 more source

